Skip to content

A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.

Notifications You must be signed in to change notification settings

jobertabma/ground-control

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

48 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Ground control

This is a collection of all my scripts that I use to debug Server Side Request Forgery (SSRF), blind XSS, and insecure XXE processing vulnerabilities. This is still a work in progress, as I'm still collecting all the scripts that I have lingering around. Before using these scripts, I used to rewrite these scripts most of the time or set up listeners with netcat. That wasn't scalable, so I started collecting the scripts in a repository, which can be closed easily every time it's needed it on a server.

Requirements

Running this script requires Ruby 2.3.3p222, a valid SSL certificate for a domain you own, and a web server that allows to open port 80, 443, 8080, and 8443. The use of each port will be explained in this document.

Setting up

Clone this repository and install the required components by running install.sh. After that, run start.sh to start to listen on all ports.

Functions

Redirects

The /redirect endpoint is used to redirect a request to another server or endpoint. This may assist you when you need an external server to redirect back to an internal system. See below for examples.

curl -vv "http://server/redirect?url=http://169.254.169.254/latest/meta-data/"

Ping

Sometimes, you simply need a page that responds with a certain body and headers. The /ping endpoint does exactly that. Here's a few examples.

curl -vv "http://server/pingpong?&body=%3ch1%3eHello%3c/h1%3e"

About

A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published